Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/93253?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/93253?format=api", "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354?arch=el9_2", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "5.14.0-284.69.1.rt14.354", "qualifiers": { "arch": "el9_2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76343?format=api", "vulnerability_id": "VCID-d6th-8p9s-j7h7", "summary": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32048", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32324", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32208", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32123", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.31983", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32543", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32535", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32506", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32541", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350", "reference_id": "2281350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350" }, { "reference_url": "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8", "reference_id": "2897c981ee63e1be5e530b1042484626a10b26d8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/" } ], "url": "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8" }, { "reference_url": "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779", "reference_id": "65a4ade8a6d205979292e88beeb6a626ddbd4779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/" } ], "url": "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779" }, { "reference_url": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1", "reference_id": "72a729868592752b5a294d27453da264106983b1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/" } ], "url": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1" }, { "reference_url": "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e", "reference_id": "aef855df7e1bbd5aa4484851561211500b22707e", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/" } ], "url": "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e" }, { "reference_url": "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe", "reference_id": "b2fa86b2aceb4bc9ada51cea90f61546d7512cbe", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/" } ], "url": "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3854", "reference_id": "RHSA-2024:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3855", "reference_id": "RHSA-2024:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4349", "reference_id": "RHSA-2024:4349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4902", "reference_id": "RHSA-2024:4902", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4902" }, { "reference_url": "https://usn.ubuntu.com/6818-1/", "reference_id": "USN-6818-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-1/" }, { "reference_url": "https://usn.ubuntu.com/6818-2/", "reference_id": "USN-6818-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-2/" }, { "reference_url": "https://usn.ubuntu.com/6818-3/", "reference_id": "USN-6818-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-3/" }, { "reference_url": "https://usn.ubuntu.com/6818-4/", "reference_id": "USN-6818-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-4/" }, { "reference_url": "https://usn.ubuntu.com/6819-1/", "reference_id": "USN-6819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-1/" }, { "reference_url": "https://usn.ubuntu.com/6819-2/", "reference_id": "USN-6819-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-2/" }, { "reference_url": "https://usn.ubuntu.com/6819-3/", "reference_id": "USN-6819-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-3/" }, { "reference_url": "https://usn.ubuntu.com/6819-4/", "reference_id": "USN-6819-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52667" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d6th-8p9s-j7h7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77685?format=api", "vulnerability_id": "VCID-j9ud-q26e-4qbk", "summary": "kernel: kvm: Avoid potential UAF in LPI translation cache", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02708", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02568", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02586", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02611", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02565", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02573", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02661", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02691", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4", "reference_id": "12c2759ab1343c124ed46ba48f27bd1ef5d2dff4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801", "reference_id": "2265801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801" }, { "reference_url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1", "reference_id": "65b201bf3e9af1b0254243a5881390eda56f72d1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1" }, { "reference_url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f", "reference_id": "ad362fe07fecf0aba839ff2cc59a3617bd42c33f", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f" }, { "reference_url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703", "reference_id": "ba7be666740847d967822bed15500656b26bc703", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703" }, { "reference_url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88", "reference_id": "d04acadb6490aa3314f9c9e087691e55de153b88", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88" }, { "reference_url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6", "reference_id": "dba788e25f05209adf2b0175eb1691dc89fb1ba6", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6" }, { "reference_url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80", "reference_id": "dd3956a1b3dd11f46488c928cb890d6937d1ca80", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/" } ], "url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3854", "reference_id": "RHSA-2024:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3855", "reference_id": "RHSA-2024:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4415", "reference_id": "RHSA-2024:4415", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4415" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8161", "reference_id": "RHSA-2024:8161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8161" }, { "reference_url": "https://usn.ubuntu.com/6688-1/", "reference_id": "USN-6688-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6688-1/" }, { "reference_url": "https://usn.ubuntu.com/6725-1/", "reference_id": "USN-6725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6725-1/" }, { "reference_url": "https://usn.ubuntu.com/6725-2/", "reference_id": "USN-6725-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6725-2/" }, { "reference_url": "https://usn.ubuntu.com/6767-1/", "reference_id": "USN-6767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6767-1/" }, { "reference_url": "https://usn.ubuntu.com/6767-2/", "reference_id": "USN-6767-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6767-2/" }, { "reference_url": "https://usn.ubuntu.com/6818-1/", "reference_id": "USN-6818-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-1/" }, { "reference_url": "https://usn.ubuntu.com/6818-2/", "reference_id": "USN-6818-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-2/" }, { "reference_url": "https://usn.ubuntu.com/6818-3/", "reference_id": "USN-6818-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-3/" }, { "reference_url": "https://usn.ubuntu.com/6818-4/", "reference_id": "USN-6818-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-4/" }, { "reference_url": "https://usn.ubuntu.com/6819-1/", "reference_id": "USN-6819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-1/" }, { "reference_url": "https://usn.ubuntu.com/6819-2/", "reference_id": "USN-6819-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-2/" }, { "reference_url": "https://usn.ubuntu.com/6819-3/", "reference_id": "USN-6819-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-3/" }, { "reference_url": "https://usn.ubuntu.com/6819-4/", "reference_id": "USN-6819-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6819-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-26598" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ud-q26e-4qbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77879?format=api", "vulnerability_id": "VCID-n1w6-27yz-dfer", "summary": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28149", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28105", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28062", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31408", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31893", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3222", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.31874", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32099", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822", "reference_id": "2256822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822" }, { "reference_url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768", "reference_id": "2e07e8348ea454615e268222ae3fc240421be768", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/" } ], "url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10941", "reference_id": "RHSA-2024:10941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3854", "reference_id": "RHSA-2024:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3855", "reference_id": "RHSA-2024:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3859", "reference_id": "RHSA-2024:3859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3859" }, { "reference_url": "https://usn.ubuntu.com/6606-1/", "reference_id": "USN-6606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6606-1/" }, { "reference_url": "https://usn.ubuntu.com/6680-1/", "reference_id": "USN-6680-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-1/" }, { "reference_url": "https://usn.ubuntu.com/6680-2/", "reference_id": "USN-6680-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-2/" }, { "reference_url": "https://usn.ubuntu.com/6680-3/", "reference_id": "USN-6680-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-3/" }, { "reference_url": "https://usn.ubuntu.com/6681-1/", "reference_id": "USN-6681-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-1/" }, { "reference_url": "https://usn.ubuntu.com/6681-2/", "reference_id": "USN-6681-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-2/" }, { "reference_url": "https://usn.ubuntu.com/6681-3/", "reference_id": "USN-6681-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-3/" }, { "reference_url": "https://usn.ubuntu.com/6681-4/", "reference_id": "USN-6681-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-4/" }, { "reference_url": "https://usn.ubuntu.com/6686-1/", "reference_id": "USN-6686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-1/" }, { "reference_url": "https://usn.ubuntu.com/6686-2/", "reference_id": "USN-6686-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-2/" }, { "reference_url": "https://usn.ubuntu.com/6686-3/", "reference_id": "USN-6686-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-3/" }, { "reference_url": "https://usn.ubuntu.com/6686-4/", "reference_id": "USN-6686-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-4/" }, { "reference_url": "https://usn.ubuntu.com/6686-5/", "reference_id": "USN-6686-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-5/" }, { "reference_url": "https://usn.ubuntu.com/6705-1/", "reference_id": "USN-6705-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6705-1/" }, { "reference_url": "https://usn.ubuntu.com/6716-1/", "reference_id": "USN-6716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6716-1/" }, { "reference_url": "https://usn.ubuntu.com/6739-1/", "reference_id": "USN-6739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6739-1/" }, { "reference_url": "https://usn.ubuntu.com/6740-1/", "reference_id": "USN-6740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6740-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-51779" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78060?format=api", "vulnerability_id": "VCID-z5c6-dfvg-dyhm", "summary": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5090", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11596", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11611", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11537", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11617", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11757", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1173", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11567", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11692", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11651", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12366", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12411", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5090" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122", "reference_id": "2248122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2758", "reference_id": "RHSA-2024:2758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3854", "reference_id": "RHSA-2024:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3855", "reference_id": "RHSA-2024:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://usn.ubuntu.com/6497-1/", "reference_id": "USN-6497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6497-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-1/", "reference_id": "USN-6502-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-2/", "reference_id": "USN-6502-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-3/", "reference_id": "USN-6502-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-3/" }, { "reference_url": "https://usn.ubuntu.com/6502-4/", "reference_id": "USN-6502-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-4/" }, { "reference_url": "https://usn.ubuntu.com/6503-1/", "reference_id": "USN-6503-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6503-1/" }, { "reference_url": "https://usn.ubuntu.com/6520-1/", "reference_id": "USN-6520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6520-1/" }, { "reference_url": "https://usn.ubuntu.com/6537-1/", "reference_id": "USN-6537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6537-1/" }, { "reference_url": "https://usn.ubuntu.com/6572-1/", "reference_id": "USN-6572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6572-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-5090" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z5c6-dfvg-dyhm" } ], "fixing_vulnerabilities": [], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354%3Farch=el9_2" }